ICS/OT

Flaws in ABB Network Interface Modules Expose Industrial Systems to DoS Attacks

Industrial technology giant ABB is working on patches for three high-severity vulnerabilities discovered by researchers in some of the company’s network interface modules.

<p><strong><span><span>Industrial technology giant ABB is working on patches for three high-severity vulnerabilities discovered by researchers in some of the company’s network interface modules.</span></span></strong></p>

Industrial technology giant ABB is working on patches for three high-severity vulnerabilities discovered by researchers in some of the company’s network interface modules.

The vulnerabilities affect Symphony Plus SPIET800 and PNI800, which are network interface modules that enable communications between a control network and a host computer running an engineering tool or a human-machine interface (HMI).

Due to the way these products handle certain packets, an attacker who has local access to the control network or remote access to a system server can cause a denial-of-service (DoS) condition that can only be addressed with a manual reboot.

The vulnerabilities, discovered by researchers at OT cybersecurity firm Verve Industrial, have been assigned the CVE identifiers CVE-2021-22285, CVE-2021-22286 and CVE-2021-22288, and they have all been rated “high severity.”

ABB published an advisory for these vulnerabilities in February and the US Cybersecurity and Infrastructure Security Agency (CISA) released an advisory last week to inform organizations using the affected products about the risks.

The vendor’s initial advisory said patches were planned for the first quarter of 2022, but CISA’s advisory says fixes should become available in the second quarter. In the meantime, exploitation can be prevented by ensuring that malicious actors cannot access the vulnerable devices.

“The vulnerabilities do not require any specific access or permissions on the device,” Lance Lamont, software engineer at Verve, told SecurityWeek. “If a network connection can be initiated to the device the vulnerability can be exploited.”

Regarding the possibility of exploitation from the internet, Lamont explained, “In the world of OT there is typically a great deal of effort placed in isolation of internal industrial control devices and the internet in general. Numerous technologies can be utilized to mitigate vulnerabilities like this one including firewalls, VPNs, and data diodes. With properly configured OT infrastructure it would be very difficult or impossible to exploit these vulnerabilities from the internet in general.”

Advertisement. Scroll to continue reading.

Exploitation of the vulnerabilities could cause disruptions in industrial environments — in addition to the direct impact on the SPIET800 and PNI800 devices, systems connected to these devices will also be affected, ABB said.

Asked to describe a theoretical worst-case scenario resulting from the exploitation of these vulnerabilities, Lamont explained, “When these vulnerabilities are exploited it causes the device to no longer interact over its network port. There is no way to remotely send commands to it or receive updates from it until the device is rebooted. Given the wide variety of applications these devices could be used for, it is difficult or impossible to describe a worst-case – it would be very different depending on the specifics of that installation.”

ABB said in its February advisory that it had not been aware of any attacks exploiting these vulnerabilities.

Related: Flaws in ABB DCS Allow Hackers to Cause Disruption in Industrial Environments

Related: Vulnerability in ABB Plant Historian Disclosed 5 Years After Discovery

Related: Vulnerability Allows Hackers to Take Control of ABB Substation Protection Devices

Related Content

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version